Shamal Faily
Analysing chindōgu: applying defamiliarisation to security design.
Faily, Shamal
Authors
Abstract
Envisaging how secure systems might be attacked is difficult without adequate attacker models or relying on stereotypes. Defamiliarisation removes this need for a priori domain knowledge and encourages designers to think critically about system properties otherwise considered innocuous. However, questions remain about how such an approach might fit into the larger design process. This paper illustrates how security requirements were elicited by building a security chindōgu, and using defamiliarisation to help analyse it. We summarise this technique before briefly describing its use in a real-world setting.
Citation
FAILY, S. 2012. Analysing chindōgu: applying defamiliarisation to security design. Presented at the Workshop on defamiliarization in innovation and usability, part of the 30th ACM SIGCHI conference on human factors in computing systems (CHI 2012), 5 May 2012, Austin, Texas.
Presentation Conference Type | Conference Paper (unpublished) |
---|---|
Conference Name | Workshop on defamiliarization in innovation and usability, part of the 30th ACM SIGCHI conference on human factors in computing systems (CHI 2012) |
Start Date | May 5, 2012 |
Publicly Available Date | Dec 21, 2021 |
Peer Reviewed | Peer Reviewed |
Keywords | Defamiliarisation; Security risk analysis; Software engineering |
Public URL | https://rgu-repository.worktribe.com/output/1427774 |
Additional Information | This paper was submitted to the ACM SIGCHI conference on human factors in computing systems (CHI 2012), 5-10 May 2012, Austin, Texas. |
Files
FAILY 2012 Analysing chindogu
(840 Kb)
PDF
You might also like
Privacy goals for the data lifecycle.
(2022)
Journal Article
Assessing system of systems information security risk with OASoSIS.
(2022)
Journal Article
Visualising personas as goal models to find security tensions.
(2021)
Journal Article
Evaluating privacy: determining user privacy expectations on the web.
(2021)
Journal Article
DPIA in context: applying DPIA to assess privacy risks of cyber physical systems.
(2020)
Journal Article
Downloadable Citations
About OpenAIR@RGU
Administrator e-mail: publications@rgu.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search